Skip to main content

previous disabled Page of 105
and
  1. No Access

    Chapter and Conference Paper

    InDNI: An Infection Time Independent Method for Diffusion Network Inference

    Diffusion network inference aims to reveal the message propagation process among users and has attracted many research interests due to the fundamental role it plays in some real applications, such as rumor-sp...

    Guoxin Chen, Yongqing Wang, Jiangli Shao, Boshen Shi, Huawei Shen in Information Retrieval (2023)

  2. No Access

    Chapter and Conference Paper

    CO-AutoML: An Optimizable Automated Machine Learning System

    In recent years, many automated machine learning (AutoML) techniques are proposed for the automatic selection or design machine learning models. They bring great convenience to the use of machine learning techniq...

    Chunnan Wang, Hongzhi Wang, Bo Xu in Database Systems for Advanced Applications (2022)

  3. No Access

    Chapter and Conference Paper

    Research on the Design and Education of Serious Network Security Games

    Through the correct teaching and game design, not only can innovation be carried out, but the highly effective network security teaching and the training solution countermeasure can also develop the student’s ...

    Keyong Wang, Pei Wang, Yuanheng Zhang, Dequan Yang in Data Science (2022)

  4. No Access

    Chapter and Conference Paper

    Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption

    Blockchain has been widely used in many fields because it can solve the problem of information asymmetry and enable users who do not trust each other to collaborate without the participation of third-party int...

    Yang Li, Baoyue Qi, Mengmeng Wang, Jianming Zhu, **uli Wang in Data Science (2022)

  5. No Access

    Chapter and Conference Paper

    Input Enhanced Logarithmic Factorization Network for CTR Prediction

    Factorization-based methods, which can automatically model second-order or higher-order cross features, have been the benchmark models for click-through rate (CTR) prediction. In general, they enumerate all cr...

    **anzhuang Li, Zhen Wang, Xuesong Wu in Advances in Knowledge Discovery and Data M… (2022)

  6. No Access

    Chapter and Conference Paper

    BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum

    Blockchains are widely used because of their openness, transparency, nontampering and decentralization. However, there is a high risk of information leakage when trading on blockchain, and the existing anonymo...

    Yang Li, Yinyun Zhang, Mengmeng Wang, Jianming Zhu, **uli Wang in Data Science (2022)

  7. No Access

    Chapter and Conference Paper

    KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment

    Blockchain is a shared database with excellent characteristics, such as high decentralization and traceability. However, data leakage is still a major problem for blockchain transactions. To address this issue...

    Yang Li, Mengmeng Wang, Jianming Zhu, **uli Wang in Data Science (2022)

  8. No Access

    Chapter and Conference Paper

    Inter-and-Intra Domain Attention Relational Inference for Rack Temperature Prediction in Data Center

    In a data center, predicting the rack temperature then generating alarms when an exception is detected can prevent server failure caused by high rack temperature. Each measuring point records the temperature o...

    Fang Shen, Zhan Li, Bing Pan, Ziwei Zhang in Database Systems for Advanced Applications (2022)

  9. No Access

    Chapter and Conference Paper

    S \(^2\) QL: Retrieval Augmented Zero-Shot Question Answering over Knowledge Graph

    Knowledge Graph Question Answering (KGQA) is a challenging task that aims to obtain the entities from the given Knowledge Graph (KG) to answer the user’s natural language questions. Most existing studies are f...

    Daoguang Zan, Sirui Wang, Hongzhi Zhang in Advances in Knowledge Discovery and Data M… (2022)

  10. No Access

    Chapter and Conference Paper

    Rethinking Adjacent Dependency in Session-Based Recommendations

    Session-based recommendations (SBRs) recommend the next item for an anonymous user by modeling the dependencies between items in a session. Benefiting from the superiority of graph neural networks (GNN) in learni...

    Qian Zhang, Shou** Wang, Wenpeng Lu in Advances in Knowledge Discovery and Data M… (2022)

  11. No Access

    Chapter and Conference Paper

    Concurrent Transformer for Spatial-Temporal Graph Modeling

    Previous studies have shown that concurrently extracting spatial and temporal information is a better way to model spatial-temporal data. However, in these studies, the receptive field has been fixed to constr...

    Yi **e, Yun **ong, Yangyong Zhu, Philip S. Yu in Database Systems for Advanced Applications (2022)

  12. No Access

    Chapter and Conference Paper

    3D Visualization Supporting Situational Awareness of Model-Based System of Systems

    Model-based System of Systems Engineering (MBSoSE) enables to improve the efficiency of the architecture design, and the performance analysis and modeling of highly complex system of systems (SoS). Introducing...

    Yuqian Cao, Boyu **e, Jian Wang, **aochen Zheng in Knowledge and Systems Sciences (2022)

  13. No Access

    Chapter and Conference Paper

    Data Quality Identification Model for Power Big Data

    Data quality identification is an important task in power big data. Abnormal data exist and hamper the effective utilization of power big data. Moreover, the lack of labeled data makes the detection of abnorma...

    Haijie Zheng, Bing Tian, **aobao Liu, Wenbin Zhang, Shenqi Liu, Cong Wang in Data Science (2022)

  14. No Access

    Chapter and Conference Paper

    Definition-Augmented Jointly Training Framework for Intention Phrase Mining

    We propose to mine intention phrases from large numbers of queries, for enabling rich query interpretation that identifies both query intentions and associated intention types. We formalize the notion of inten...

    Denghao Ma, Yueguo Chen, Changyu Wang in Database Systems for Advanced Applications (2022)

  15. No Access

    Chapter and Conference Paper

    An AI-Based Feedback Visualisation System for Speech Training

    This paper proposes providing automatic feedback to support public speech training. For the first time, speech feedback is provided on a visual dashboard including not only the transcription and pitch informat...

    Adam T. Wynn, **gyun Wang, Kaoru Umezawa in Artificial Intelligence in Education. Pos… (2022)

  16. No Access

    Chapter and Conference Paper

    Intelligent Modeling Framework for System of Systems Architecture Based on Knowledge Graph

    Enterprise architecture framework such as DoDAF has become an effective method in recent years to describe a system of systems structure and guide its revolution, especially in the military field. However, the...

    Yue Zhang, Minghao Li, **ngliang Wang, Yajie Dou in Knowledge and Systems Sciences (2022)

  17. No Access

    Chapter and Conference Paper

    A Novel Bayesian Deep Learning Approach to the Downscaling of Wind Speed with Uncertainty Quantification

    Wind plays a crucial part during adverse events, such as storms and wildfires, and is a widely leveraged source of renewable energy. Predicting long-term daily local wind speed is critical for effective monito...

    Firas Gerges, Michel C. Boufadel in Advances in Knowledge Discovery and Data M… (2022)

  18. No Access

    Chapter and Conference Paper

    Enhancing Auto-scoring of Student Open Responses in the Presence of Mathematical Terms and Expressions

    Prior works have led to the development and application of automated assessment methods that leverage machine learning and natural language processing. The performance of these methods have often been reported...

    Sami Baral, Karthik Seetharaman in Artificial Intelligence in Education (2022)

  19. No Access

    Chapter and Conference Paper

    The Differential Gene Detecting Method for Identifying Leukemia Patients

    Leukemia is one of the cancers threatening human being for many years. There has not been any general method for identifying acute myeloid leukemia (AML) and acute lymphoblastic leukemia (ALL) accurately. This...

    Mingzhao Wang, Weiliang Jiang, Juanying **e in Advances and Trends in Artificial Intellig… (2022)

  20. No Access

    Chapter and Conference Paper

    RShield: A Refined Shield for Complex Multi-step Attack Detection Based on Temporal Graph Network

    Complex multi-step attacks (i.e., CMA) have caused severe damage to core information infrastructures of many organizations. The graph-based methods are well known as the ability for learning complex interactio...

    Weiyong Yang, Peng Gao, Hao Huang in Database Systems for Advanced Applications (2022)

previous disabled Page of 105